Patent application number | Description | Published |
20100332492 | RETRIEVAL OF RELEVANT OBJECTS IN A SIMILARITY - Techniques for retrieval of one or more relevant multi-attribute structured objects with respect to a query are provided. The techniques include receiving a query, grouping one or more attributes of one or more objects in a database into one or more groups according to how each bears a relation to the query, and using the one or more attribute groups to produce an output of one or more relevant multi-attribute structured objects in response to the query. | 12-30-2010 |
20110055811 | Discovery, Analysis, and Visualization of Dependencies - Product data pertaining to a plurality of products is gathered from a plurality of sources. Dependency information for the plurality of products is extracted from the product data. The dependency information is analyzed to determine dependencies for each product of the plurality of products. The dependencies for each product of the plurality of products are displayed to a user. | 03-03-2011 |
20110106580 | SYSTEM AND METHOD FOR EXAMPLE BASED TARGETED MARKETING - Embodiments of the invention provide retailers with the ability to employ concept-based marketing using only a few representative examples. Embodiments of the invention take seed examples, utilize the seed examples to provide an expanded list (that can be edited as desired) representative of the concept, and map the expanded list to a final set of customers to be included in a targeted marketing operation. | 05-05-2011 |
20110191762 | MINING DEPENDENCIES FROM DISK IMAGES - Methods and arrangements for automatically finding the dependency of a software product on other software products or components. From an install image or directory, a signature is found by deriving the same from a directory structure of the software. Further, a directory tree structure is built and an approximate sub-tree matching algorithm is applied to find commonalties across software products. | 08-04-2011 |
20120039460 | CUSTOMER SERVICE ANALYSIS - A method, a system and a computer program product for analyzing customer service quality is disclosed. A plurality of customer call service quality parameters is identified using historical data. The plurality of customer call service quality parameters is quantified and correlated. The customer service quality is analyzed using the plurality of customer call service quality parameters. A repository is generated using the historical data of a plurality of customer calls and a set of pre-defined customer call flow templates. A subset of service quality queries is identified using contextual information of the customer call from the repository of service quality queries. The subset of service quality queries is then interspersed in the customer call. The customer service quality is analyzed using responses to the subset of service quality queries. | 02-16-2012 |
20120109664 | OPTIMIZED CUSTOMER TARGETING BASED ON TEMPLATE CRM OFFERS - A Customer Relationship Management (CRM) offer template is established in data storage and includes at least one variable field and having at least one offer attribute. For each of a plurality of customer groups, a data processing system calculates an expected benefit to be obtained by sending an instantiated CRM offer to a customer based upon historical responses, offer cost, and legal values of the at least one variable field. The data processing system outputs a CRM offer instance and target list of customers that maximizes the expected benefit. | 05-03-2012 |
20120150867 | CLUSTERING A COLLECTION USING AN INVERTED INDEX OF FEATURES - Provided are techniques for creating an inverted index for features of a set of data elements, wherein each of the data elements is represented by a vector of features, wherein the inverted index, when queried with a feature, outputs one or more data elements containing the feature. The features of the set of data elements are ranked. For each feature in the ranked list, the inverted index is queried for data elements having the feature and not having any previously selected feature and a cluster of the data elements is created based on results returned in response to the query. | 06-14-2012 |
20120323939 | MINING DEPENDENCIES FROM DISK IMAGES - Methods and arrangements for automatically finding the dependency of a software product on other software products or components. From an install image or directory, a signature is found by deriving the same from a directory structure of the software. Further, a directory tree structure is built and an approximate sub-tree matching algorithm is applied to find commonalities across software products. | 12-20-2012 |
Patent application number | Description | Published |
20090150436 | METHOD AND SYSTEM FOR CATEGORIZING TOPIC DATA WITH CHANGING SUBTOPICS - The embodiments of the invention provide a method for the automatic identification of changing subtopics within topics. The method begins by receiving customer satisfaction data having unstructured data objects. Next, the data objects are automatically categorized into pre-defined topics, wherein the pre-defined topics do not change throughout the customer satisfaction analysis. The pre-defined topics can be automatically defined based on a history of customer satisfaction data. Following this, a clustering analysis is automatically performed to identify subtopics of the data objects within the pre-defined topics. The subtopics are more specific than the pre-defined topics, and the subtopics can change. Further, the clustering analysis can include extracting features from the data objects and grouping the features into the subtopics. Each of the subtopics includes features having a predetermined degree of similarity. | 06-11-2009 |
20090196427 | SYSTEM AND COMPUTER PROGRAM PRODUCT FOR PROTECTING AUDIO CONTENT - Techniques for protecting information in an audio file are provided. The techniques include obtaining an audio file, detecting information beating one or more segments in a speech signal, wherein the information comprises information sought for protection, encrypting the information sought for protection by scrambling the one or more segments using a scrambling filter, and selectively decrypting an amount of the encrypted information, wherein the amount of the encrypted information to be decrypted depends on user access privilege, and wherein selectively decrypting the amount of the encrypted information protects said amount of the encrypted information. Techniques are also provided for protecting information in an audio file. | 08-06-2009 |
20090199015 | METHOD FOR PROTECTING AUDIO CONTENT - Techniques for protecting information in an audio file are provided. The techniques include obtaining an audio file, detecting information bearing one or more segments in a speech signal, wherein the information comprises information sought for protection, encrypting the information sought for protection by scrambling the one or more segments using a scrambling filter, and selectively decrypting an amount of the encrypted information, wherein the amount of the encrypted information to be decrypted depends on user access privilege, and wherein selectively decrypting the amount of the encrypted information protects said amount of the encrypted information. Techniques are also provided for protecting information in an audio file. | 08-06-2009 |
20090259954 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR VISUALIZING DATA - A plurality of data attributes are displayed to a user. The user makes a selection of at least two of the attributes. An initial one of the selected attributes is displayed, together with all possible values for the initial one of the selected attributes. The user selects at least one of the possible values for the initial one of the selected attributes. A second one of the selected attributes is displayed, together with all possible values for the second one of the selected attributes that correspond to the selected value of the preceding attribute, along with a corresponding measure for each of the possible values for the second one of the selected attributes | 10-15-2009 |
20090271720 | METHOD FOR DERIVING INTELLIGENCE FROM ACTIVITY LOGS - Techniques for segregating one or more logs of at least one multitasking user to derive at least one behavioral pattern of the at least one multitasking user are provided. The techniques include obtaining at least one of at least one action log, configuration information, domain knowledge, at least one task history and open task repository information, correlating the at least one of at least one action log, configuration information, domain knowledge, at least one task history and open task repository information to determine a task associated with each of one or more actions and segregate the one or more logs based on the one or more actions, and using the one or more logs that have been segregated to derive at least one behavioral pattern of the at least one multitasking user. Techniques are also provided for deriving intelligence from at least one activity log of at least one multitasking user to provide information to the at least one user. | 10-29-2009 |
20090271800 | SYSTEM AND COMPUTER PROGRAM PRODUCT FOR DERIVING INTELLIGENCE FROM ACTIVITY LOGS - Techniques for segregating one or more logs of at least one multitasking user to derive at least one behavioral pattern of the at least one multitasking user are provided. The techniques include obtaining at least one of at least one action log, configuration information, domain knowledge, at least one task history and open task repository information, correlating the at least one of at least one action log, configuration information, domain knowledge, at least one task history and open task repository information to determine a task associated with each of one or more actions and segregate the one or more logs based on the one or more actions, and using the one or more logs that have been segregated to derive at least one behavioral pattern of the at least one multitasking user. Techniques are also provided for deriving intelligence from at least one activity log of at least one multitasking user to provide information to the at least one user. | 10-29-2009 |
20110055285 | INFORMATION EXTRACTION COMBINING SPATIAL AND TEXTUAL LAYOUT CUES - Techniques for extracting information from a formatted document are provided. The techniques include combining one or more visual layout rules, one or more mark-up rules and one or more text-based rules in connection with a formatted document, and specifying one or more rules from the one or more visual layout rules, one or more mark-up rules and one or more text based rules to extract information from the formatted document. | 03-03-2011 |
20130290170 | ESTABLISHING PERSONALIZED MOBILE MONEY TRANSFER LIMITS - Methods and arrangements for establishing financial transfer limits. A customer reputation score for mobile money transfer is determined. A mobile money transfer limit is established based on the customer reputation score, and the customer reputation score is updated in response to predetermined parameters. | 10-31-2013 |
20140114841 | Monitoring Flows in an Evolving Transaction Network Using Dynamic Rules - Methods and arrangements for monitoring and flagging distinct flows in an evolving network. There is identified a locality comprising at least two nodes in a graph of nodes and edges, wherein the edges represent interactions between nodes. At least one target source-destination node pair is identified in the locality for monitoring, and at least one monitoring rule is generated. An interaction is flagged upon a detected violation of at least one monitoring rule, and there is updated, in response to the detected rule violation, at least one of: the identified locality; the at least one target source-destination pair; and the at least one monitoring rule. | 04-24-2014 |
20140278741 | CUSTOMER COMMUNITY ANALYTICS - A method, system and software for using customer community analytics for: (i) discovering relationships (for example, financial transactional relationships) between customers and other entities (such as companies); (ii) representing the customers, other entities and their relationships in the form of a machine readable graph; and (iii) using the graph to perform graph-based functions. These functions may include: up-selling, cross-selling, making personalized recommendations, discovering a financial products supply chain and/or facilitating social interactions between and among customers and other entities. | 09-18-2014 |
20140358843 | Determining Related Data Points from Multi-Modal Inputs - Techniques, systems, and articles of manufacture for determining related data points from multi-modal inputs. A method includes collecting multiple items of multi-modal data comprising at least one dimension from multiple data sources, wherein said at least one dimension comprises a geographic dimension, a temporal dimension and/or an event-related dimension, determining a window of relevance for each of the multiple items of multi-modal data with respect to the at least one dimension, and identifying two or more of the multiple items of multi-modal data as related, by determining an overlap of the window of relevance corresponding to each of the two or more items of multi-modal data with respect to the at least one dimension. | 12-04-2014 |